{"id":13434,"date":"2021-08-26T09:30:50","date_gmt":"2021-08-26T14:30:50","guid":{"rendered":"https:\/\/sterling.com\/?p=13434"},"modified":"2021-08-26T09:30:50","modified_gmt":"2021-08-26T14:30:50","slug":"three-starting-points-for-the-zero-trust-roadmap","status":"publish","type":"post","link":"https:\/\/sterling.com\/stargazer\/?p=13434","title":{"rendered":"Three starting points for the zero-trust roadmap"},"content":{"rendered":"<p><span style=\"font-size: 12pt;\"><em>Written by: Jenni Barber, Sterling<\/em><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>With cyberattacks increasing at an exponential rate from 2020 to 2021, make sure you are proactive and prepared, with risk mitigation, incident-response plans, and a Zero-Trust cybersecurity model in place. Don\u2019t fall into the ransomware trap and become a statistic of cyber breach.<\/p>\n<p>Three starting points to protect your organization with a zero-trust road map:<\/p>\n<h5><strong>1. Multifactor authentication<\/strong><\/h5>\n<p>Simply put, multifactor authentication (MFA) is an electronic authentication method that will not permit a user to access a website, application, or data without first successfully verifying at least two pieces of independent credentials.<\/p>\n<p>There are three main authentication methods: knowledge, possession, and inherence. Knowledge factors are generally passwords, pins, or information such as your pet\u2019s first name. Possession factors are specific to something within the user\u2019s ownership, such as a security token, badge, or mobile phone for authentication. The third factor, inherence, uses biological traits of the user to confirm validity for login (fingerprint scanning, voice recognition, or retina scans, for example).<\/p>\n<p>Multifactor authentication adds layers of security to hardware and software and can be easily set up by users, providing a flexible, affordable option for businesses. <em>MFA can <\/em><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/05\/it-executives-prioritize-multi-factor-authentication-2020\/\"><em>reduce security breaches by up to 99.9%<\/em><\/a> over passwords alone.<\/p>\n<p>Sterling recommends three different MFA solutions for getting started [click each for more information]:<\/p>\n<ul>\n<li><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/sterling.com\/stargazer\/Sterling-Duo-CoBrand.pdf\">Cisco Duo<\/a><\/span><\/li>\n<li><a href=\"https:\/\/sterling.com\/stargazer\/Sterling-Okta-Cobrand.pdf\"><span style=\"color: #000080;\">Okta<\/span><\/a><\/li>\n<li><a href=\"https:\/\/sterling.com\/stargazer\/Sterling-RSA-SecurID-CoBrand.pdf\"><span style=\"color: #000080;\">RSA SecureID Access<\/span><\/a><\/li>\n<\/ul>\n<h5><\/h5>\n<h5><strong>2. Employee\/end-user security-awareness training<\/strong><\/h5>\n<p>According to <a href=\"https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/\">Cybint<\/a>, 95% of cybersecurity breaches are caused by human error. Don\u2019t let your company get caught up in that statistic when it comes to cyber-preparedness.<\/p>\n<p>It\u2019s critical to train employees and any end-user on best practices when it comes to company data and cybersecurity. It is a not only a good idea to train new hires but to have ongoing refresher courses to keep staff up with trending threats. Empower your employees to recognize and report common cyber threats such as email phishing and social engineering, along with upholding password and document-management best practices.<\/p>\n<p>Click below for more information about opportunities to protect, train, and arm your employees in handling cyber-attacks.<\/p>\n<ul>\n<li><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/sterling.com\/stargazer\/Sterling-%202021-Proofpoint-Security-Awareness-Training-Packages.pdf\">Proof Point<\/a><\/span><\/li>\n<li><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/sterling.com\/stargazer\/Sterling-Knowbe4-cobrand.pdf\">Know B4<\/a><\/span><\/li>\n<\/ul>\n<h5><\/h5>\n<h5>3. Do a cybersecurity <a href=\"https:\/\/sterling.com\/stargazer\/assessment\/\">assessment<\/a><\/h5>\n<p>Evaluate. Review. Repeat. Have you looked at your organization\u2019s risk factors lately?<br \/>\nDo you know your vulnerabilities? Are you prepared to recover if a cyber breach occurs? Assess system architecture, network configurations, client devices, and business processes often.<\/p>\n<p>It doesn\u2019t stop there \u2013 use these resources to continuously monitor and detect threats:<\/p>\n<ul>\n<li><span style=\"color: #333399;\"><a style=\"color: #333399;\" href=\"https:\/\/sterling.com\/stargazer\/cybersecurity-assessment-download-form\/\">Self-assess your organization<\/a><\/span>&#8211; cybersecurity preparedness self-assessment survey<\/li>\n<li><a href=\"https:\/\/sterling.com\/stargazer\/cybersecurity-checklist-download-form\/\"><span style=\"color: #333399;\">Cybersecurity Checklist<\/span><\/a>&#8211; 15 ways to protect your organization<\/li>\n<\/ul>\n<p>Although MFA, end-user training, and assessments are a good start, your zero-trust model doesn\u2019t stop there. Data protection and recovery should always be on your organization\u2019s mind, continuously assessing and monitoring the threat landscape.<\/p>\n<p>Once you have these pillars of cyber hygiene in place, it\u2019s imperative you optimize. Sterling is your resource for client-to-cloud protection as you build out a custom cybersecurity zero-trust roadmap. <a href=\"https:\/\/sterling.com\/stargazer\/contact-information\/\"><span style=\"color: #333399;\">Talk to a Sterling expert<\/span><\/a> for answers to your questions and additional ways to implement a zero-trust model quick and efficiently.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by: Jenni Barber, Sterling &nbsp; With cyberattacks increasing at an exponential rate from 2020 to 2021, make sure you are proactive and prepared, with risk mitigation, incident-response plans, and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13438,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,17,1],"tags":[],"class_list":["post-13434","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-security","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three starting points for the zero-trust roadmap - Sterling<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three starting points for the zero-trust roadmap - Sterling\" \/>\n<meta property=\"og:description\" content=\"Written by: Jenni Barber, Sterling &nbsp; With cyberattacks increasing at an exponential rate from 2020 to 2021, make sure you are proactive and prepared, with risk mitigation, incident-response plans, and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sterling.com\/stargazer\/?p=13434\" \/>\n<meta property=\"og:site_name\" content=\"Sterling\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/SterlingComp\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-26T14:30:50+00:00\" \/>\n<meta name=\"author\" content=\"Sterling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:site\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sterling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434\"},\"author\":{\"name\":\"Sterling\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\"},\"headline\":\"Three starting points for the zero-trust roadmap\",\"datePublished\":\"2021-08-26T14:30:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434\"},\"wordCount\":513,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Blog\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434\",\"name\":\"Three starting points for the zero-trust roadmap - Sterling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2021-08-26T14:30:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=13434#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three starting points for the zero-trust roadmap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"name\":\"Sterling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\",\"name\":\"Sterling\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"contentUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"width\":399,\"height\":145,\"caption\":\"Sterling\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/facebook.com\\\/SterlingComp\\\/\",\"https:\\\/\\\/x.com\\\/sterlingcomp\",\"https:\\\/\\\/www.instagram.com\\\/sterlingcomputers\\\/\",\"http:\\\/\\\/youtube.com\\\/@sterlingcomp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/sterling-computers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\",\"name\":\"Sterling\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"caption\":\"Sterling\"},\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three starting points for the zero-trust roadmap - Sterling","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Three starting points for the zero-trust roadmap - Sterling","og_description":"Written by: Jenni Barber, Sterling &nbsp; With cyberattacks increasing at an exponential rate from 2020 to 2021, make sure you are proactive and prepared, with risk mitigation, incident-response plans, and [&hellip;]","og_url":"https:\/\/sterling.com\/stargazer\/?p=13434","og_site_name":"Sterling","article_publisher":"http:\/\/facebook.com\/SterlingComp\/","article_published_time":"2021-08-26T14:30:50+00:00","author":"Sterling","twitter_card":"summary_large_image","twitter_creator":"@sterlingcomp","twitter_site":"@sterlingcomp","twitter_misc":{"Written by":"Sterling","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sterling.com\/stargazer\/?p=13434#article","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13434"},"author":{"name":"Sterling","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d"},"headline":"Three starting points for the zero-trust roadmap","datePublished":"2021-08-26T14:30:50+00:00","mainEntityOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13434"},"wordCount":513,"commentCount":0,"publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13434#primaryimage"},"thumbnailUrl":"","articleSection":["Blog","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sterling.com\/stargazer\/?p=13434","url":"https:\/\/sterling.com\/stargazer\/?p=13434","name":"Three starting points for the zero-trust roadmap - Sterling","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13434#primaryimage"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13434#primaryimage"},"thumbnailUrl":"","datePublished":"2021-08-26T14:30:50+00:00","breadcrumb":{"@id":"https:\/\/sterling.com\/stargazer\/?p=13434#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sterling.com\/stargazer\/?p=13434"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/?p=13434#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/sterling.com\/stargazer\/?p=13434#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sterling.com\/stargazer\/"},{"@type":"ListItem","position":2,"name":"Three starting points for the zero-trust roadmap"}]},{"@type":"WebSite","@id":"https:\/\/sterling.com\/stargazer\/#website","url":"https:\/\/sterling.com\/stargazer\/","name":"Sterling","description":"","publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sterling.com\/stargazer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sterling.com\/stargazer\/#organization","name":"Sterling","url":"https:\/\/sterling.com\/stargazer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","width":399,"height":145,"caption":"Sterling"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/SterlingComp\/","https:\/\/x.com\/sterlingcomp","https:\/\/www.instagram.com\/sterlingcomputers\/","http:\/\/youtube.com\/@sterlingcomp","https:\/\/www.linkedin.com\/company\/sterling-computers"]},{"@type":"Person","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d","name":"Sterling","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","caption":"Sterling"},"url":"https:\/\/sterling.com\/stargazer\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/13434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13434"}],"version-history":[{"count":0,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/13434\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}